CVE-2020-8298

fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
References
Link Resource
https://github.com/pillys/fs-path/pull/6 Exploit Patch Third Party Advisory
https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7 Patch Third Party Advisory
https://hackerone.com/reports/324491 Exploit Issue Tracking Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:fs-path_project:fs-path:*:*:*:*:*:node.js:*:*

Information

Published : 2021-03-04 12:15

Updated : 2021-03-09 07:20


NVD link : CVE-2020-8298

Mitre link : CVE-2020-8298


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

fs-path_project

  • fs-path